Security: Compare and contrast common prevention methods Flashcards

1
Q

Which password policy setting allows you to configure how many new passwords must be created before an old one can be reused?

A

Password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When you log in remotely, you must provide a username, password, and smart card. How many factors of authentication is this?

A

Two factor

Although three items are presented, two items are something you know, and one is something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a T-bar lock used for?

A

Securing a laptop to a physical object such as a desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ allows users to freely access all systems to which their account has been granted access after the initial authentication

A

Single sign on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What method is the most secure for distributing passwords to employees?

a. issue the same password to all users, upon logon, force users to change their password
b. send an e-mail to each user that contains their password
c. instruct users to report to their IT department with proper identification for password setup
d. instruct users to request passwords via email

A

c. instruct users to report to the IT department with proper identification for password setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ______ is a physical token that is a one time password issued by a security device. The token is used to access network resources

A

RSA token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ is a setup with two doors and a small room between them.

The first door requires authentication to access the small room.

The second verification will occur to allow the user through the second door, which can only be opened once the first door is closed

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After determining the scope of a user’s job, what is the next step in implementing the principle of least privilege?

A

Determine the minimum set of privileges needed to perform the user’s job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the aim of security awareness training?

A

To ensure all employees understand security responsibilities

This is the best way to prevent social engineering attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ checks the identify of both ends of the connection, what authentication method does this?

A

Mutual authentication, sometimes known as two way authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What two methods are used to monitor access control violations?

A
  • Audit logs

- Intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one of the highest levels of physical security?

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) _______ uses devices such as smart cards or bio-metrics to provide access to authorized persons and prevent unauthorized access to a room

A

Access control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a smart card?

A

A hardware device that has an embedded microchip that contains authentication or security information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To provide authentication on a network that contains two servers, what should be implemented?

A

Usernames with strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ contain a microprocessor that stores information and are implemented with computers to improve network security

A

Smart cards

Usually, smart cards are read by card readers using radio waves

17
Q

What is the best implementation of multi factor authentication?

a. smart card, username, PIN
b. username, strong password, PIN
c. biometrics, smart card, strong password
d. smart card, username, strong password

A

c. biometrics, smart card, strong password

18
Q

What are some digital security methods?

A
  • Anti virus software
  • Firewalls
  • User authentication with passwords
19
Q

What are some physical security measures?

A
  • Locked doors
  • Guards
  • Mantraps
  • Shredding old documents
  • Biometrics
  • RFID badges
  • RSA tokens
  • Privacy filters
20
Q

What are some methods you can take to guard against social engineering?

A

-User education

21
Q

What are some wireless security methods?

A
  • Changing default username and password
  • Change SSID
  • Set encryption
  • Disable SSID broadcast
  • enable MAC filtering
  • Access point placement
  • Power levels
  • Static IP addresses to wireless routers
22
Q

What are some data security methods?

A
  • Hard drive formatting
  • Sanitation
  • Physical destruction
23
Q

What is the purpose of a privacy filter?

A

A privacy filter attaches to your monitor to prevent others from viewing what you have on your monitor

24
Q

The _______ involves ensuring users are given only the user rights they need to execute their authorized tasks

A

Principle of least privilege

25
Q

Gaining unauthorized access to data by using another user’s credentials is an example of what?

A

Piggybacking

Piggybacking involves one party willingly sharing information to another, knowing it may be used in the future

26
Q

What attributes can be used for biometric security?

A
  • Voice
  • Fingerprints
  • Face
  • Signature
  • Retina
  • Iris
  • Hand geometry
27
Q

What ports should be opened on a firewall to allow access to all types of web sites?

A

Port 80 (HTTP)

Port 443 (HTTPS)